
WP Router Security & Risk Analysis
wordpress.org/plugins/wp-routerProvides a simple API for mapping requests to callback functions.
Is WP Router Safe to Use in 2026?
Generally Safe
Score 85/100WP Router has no known CVEs and is actively maintained. It's a solid choice for most WordPress installations.
The 'wp-router' plugin version 0.5 exhibits a generally positive security posture based on the provided static analysis. There are no identified direct entry points like AJAX handlers, REST API routes, or shortcodes that are exposed to the public without authentication or permission checks. The absence of dangerous functions, file operations, and external HTTP requests is also a strong indicator of secure coding practices. Furthermore, all SQL queries utilize prepared statements, which is a critical defense against SQL injection vulnerabilities. The plugin also avoids bundling external libraries, simplifying its security management.
However, there are a couple of areas that warrant attention. The presence of output that is not properly escaped presents a potential Cross-Site Scripting (XSS) risk, albeit with only 50% of outputs being problematic. More concerning is the taint analysis, which identified one flow with an unsanitized path. While no critical or high severity issues were flagged in the taint analysis, an unsanitized path can be a precursor to more serious vulnerabilities if it involves user-supplied data. The plugin's vulnerability history is clean, with no recorded CVEs, which is a positive sign but should not lead to complacency. The lack of nonce and capability checks on any potential entry points (though zero are identified here) is a noted observation, but less impactful given the zero attack surface.
In conclusion, 'wp-router' v0.5 appears to be a relatively secure plugin, with significant strengths in its handling of database interactions and its limited attack surface. The primary concerns lie with the potential for XSS due to unescaped output and the single identified unsanitized path in the taint analysis. Addressing these specific code quality issues would further enhance its security.
Key Concerns
- Unescaped output detected
- Flow with unsanitized path detected
WP Router Security Vulnerabilities
WP Router Code Analysis
Output Escaping
Data Flow Analysis
WP Router Attack Surface
WordPress Hooks 15
Maintenance & Trust
WP Router Maintenance & Trust
Maintenance Signals
Community Trust
WP Router Alternatives
WP Router Developer Profile
6 plugins · 1K total installs
How We Detect WP Router
Patterns used to identify this plugin on WordPress sites during automated security audits and web crawling.
Asset Fingerprints
/wp-content/plugins/wp-router/WP_Router_Sample.class.phpHTML / DOM Fingerprints
name="WP_Route"window.WP_Router